IT Management  >   Systems Operations  >  

Systems Security

RSS Feed   
Systems Security Reports
 
How 1 University Keeps Their Petabytes of Data Safe
sponsored by Atempo, Inc.
CASE STUDY: Download this case study to learn more about how University of Lausanne was able to secure its several petabytes of data stored in 3 data centers.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Atempo, Inc.

Automating Security and Compliance for Hybrid Cloud Environments
sponsored by Red Hat
VIDEO: Why automate security and compliance? Tune into this webinar to learn about an automated approach that can help you perform audit scans on your systems, ensure governance and control, easily provide security-compliant hosts, and more.
Posted: 30 Nov 2018 | Premiered: 20 Nov 2018

Red Hat

Defending against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: In a world dominated by SSL/TLS encrypted traffic, find out how to overcome various challenges with inbound and outbound traffic inspection so that you can effectively neutralize malware attacks, intelligently route traffic, and more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

4 Critical Features of a Cyber-Resilient Architecture
sponsored by Dell EMC and Microsoft
RESOURCE: To protect your servers against cyber-attacks throughout their lifecycle, industry analysts recommend implementing four practices into your hardware security strategy. Keep reading to learn all 4.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

Dell EMC and Microsoft

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Document and Endpoint Security: Checklists and Discussion Guides
sponsored by Xeretec
WHITE PAPER: Download this white paper to review tips on protecting business documents and securing the multifunction printers and devices that create them.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Xeretec

Gain Visibility into Assets and Vulnerabilities Across Any Environment
sponsored by Alert Logic
RESOURCE: Learn how you can gain visibility into your environments (cloud, on-premises, or hybrid), and identify the remediation steps required to eliminate exposures.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

Alert Logic

You've Been Breached- Now What?
sponsored by CrowdStrike
WHITE PAPER: Learn how to respond to a worst-case cyberattack scenario, actions you can take immediately after an attack, and the long-term planning to stop the next one.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

CrowdStrike

The State of IT Incident Response in Financial Services
sponsored by EverBridge Inc.
WHITE PAPER: Discover how companies in the financial services sector perform when it comes to their security incidents that make national headlines.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

EverBridge Inc.

CW Europe – December 2018
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 06 Dec 2018 | Published: 06 Dec 2018

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement